5 Reasons Why Host-Based Intrusion Detection Systems Thrive in the Cloud

The threat landscape continues to expand as both the frequency and the financial impact of cyber security incidents increase. As a result, traditional host-based security evolves to counter new attack vectors and types of infections. On rare occasions however, two separate, independently evolving technologies can come together in a way that benefits both – and so it is, with host-based intrusion detection systems (IDS) and the cloud.

Read more “5 Reasons Why Host-Based Intrusion Detection Systems Thrive in the Cloud”

Cloud Infrastructure Security Buyer's Guide

Navigate the cloud security market space and choose a vendor for your organization.

Download Now

The History of Intrusion Detection Systems (IDS) – Part 1

Great applied technology typically needs enabling partner technology, and it will struggle to make headway until that partner appears. For decades, Intrusion Detection System (IDS) technology struggled to deliver efficient, high quality intrusion monitoring, and is only now experiencing success with the arrival of an unintentional enabling partner technology – cloud computing.

Read more “The History of Intrusion Detection Systems (IDS) – Part 1”

Cloud Infrastructure Security Buyer's Guide

Navigate the cloud security market space and choose a vendor for your organization.

Download Now